Search Results - (( developing formative usage algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- developing formative »
- java implementation »
- mining algorithm »
- formative usage »
- usage algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Coverage performance analysis of genetic algorithm controlled smart antenna system
Published 2023“…GA then operates to optimize and steer the coverage beams to cater for dynamic users' distribution with minimum power usage. The experiment with GA embedded control system smart antenna shows good result in beam formation and steering to handle mobile users. �2010 IEEE.…”
Conference paper -
9
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…System architecture was designed and implement in video adaptation algorithms development. Through the algorithm, rule-based technique was used. …”
Get full text
Get full text
Thesis -
10
Region-based Energy-aware Clustering (REC) for Efficient Packet Forwarding in WSN
Published 2010“…With REC, algorithms for energy efficient cluster formation, cluster head selection, and intercluster communication is proposed. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad
Published 2019“…Furthermore, a self-location calculation algorithm is developed to enable vehicles to calculate their location in the absence of global positioning system (GPS) signals. …”
Get full text
Get full text
Get full text
Thesis -
12
Land Use Changes in Jeli, Kelantan
Published 2013“…The study reflected the progressive development in Jeli promotes sustainable usage of forest area when effort to retreat and restore forest was carried out forming a co-existence land use category between forest and agriculture.…”
Get full text
Undergraduate Final Project Report -
13
A new mobile malware classification for call log exploitation
Published 2024journal::journal article -
14
A Model of FPGA-based Direct Torque Controller
Published 2013“…This paper presents a generic model of a fully FPGA-based direct torque controller. This model is developed using two’s-complement fixed-point format approaches, in register-transfer-level (RTL) VHDL abstraction for minimizing calculation errors and consuming hardware resource usage. …”
Get full text
Get full text
Article -
15
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
Published 2015“…Simulation models have been developed and simulated to verify the performance improvements of the proposed algorithms. …”
Get full text
Get full text
Thesis -
16
A quality of experience approach in smartphone video selection framework for energy efficiency
Published 2021“…The VCS outcomes are essential to help users and developer deciding which suitable video streaming format that can satisfy energy consumption and user QoE.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Zero distortion-based steganography for handwritten signature
Published 2018“…This means that any changes on the cover media (c) could lead to the identification of the stego media (s), which contains the secret message (m). Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
Get full text
Get full text
Get full text
Thesis -
18
Synthesis of YBa₂Cu₄O8 superconductor and analysis of electronic properties in comparison to other YBCO family compounds
Published 2020“…This study was to understand the Y124 phase formation and its formation rate. From the study, it could be summarized that; Y124 phase could form if the oxide precursors underwent the heat treatment environment in favour of Y124 and the secondary oxides would persist in sample, hence clean single phase Y124 was difficult to produce. …”
Get full text
Get full text
Thesis
